Faster Digital Forensic Analysis

Examining seized computers and devices for incriminating evidence is a slow and time-consuming process. Searching seized computers consumes valuable working time and delays the availability of evidence. Scanning through seized computers often delays an investigation and can cause an  accumulation of unfinished work in digital forensic labs.

Cyan Forensics, a startup based in Edinburgh, Scotland, whose technology helps police investigators to find evidence faster, has secured a €1.5 million additional funding from a consortium of investors and is now developing a new set of digital forensic tools capable of scanning devices in a matter of minutes. 

The software also helps accelerate processing, it can prioritise the analysis of devices that are known to contain illegal files.
The company’s software allows investigators to make quick and confident decision and helps prevent further crime ranging from terrorism to human trafficking. Within a matter of minutes, Cyan’s solution will be able to supply an investigator with enough evidence to confront suspects and know where to focus a full forensic investigation. 

Automated scans using MD5 hashes of known illegal content, such as illegal images of children or terrorist handbooks, are a valuable tool for finding evidence quickly and minimising the need for forensic analyst time. Such scans take many hours, or even days on devices with high capacity storage or slow external interfaces.

The company’s website mentions that the technology works in three steps. The first step is the preparation stage, where the system extracts relevant information from a database. 

So if the investigation is a terror investigation, the system will extract bomb-making guides or terrorist manifestos from the database. If a child sexual exploitation case is being investigated, then the extracted data from the database will likely be illegal images.

The next stage is the triage stage. The system is capable of filtering out files that almost definitely do not contain any contraband. This allows the system to scan seized computers, devices, and hard drives within minutes. 

When traditional scanning methods would take 35 minutes to scan an 80 gigabyte hard drive, Cyan Forensics’ system would only take two minutes to scan. Similarly, it would take Cyan only 27 minutes to scan a terabyte of data, where it will take traditional scanners over 7 hours to scan.

The Cyan system provides tools that show rapid results allowing analysts to focus their investigative efforts on devices that are likely to contain incriminating evidence.The system provides investigators with a useful set of tools that help stop criminals and solve crimes.

Cyan Forensics:         EU Startups:        I-HLS

You Might Also Read: 

Authenticating Digital Evidence:

 

 

 

 

« Attack Vectors Are Proliferating
US Government Cyber Security Still Needs Work »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Acutec

Acutec

Acutec is an award winning IT support, services and solutions provider including managed IT Security and backup/disaster recovery.

Cyber Security Expo

Cyber Security Expo

Cyber Security EXPO is a unique one day recruitment event for the cyber security industry.

Tata Consultancy Services

Tata Consultancy Services

Tata Consultancy Services is a global leader in IT services, consulting & business solutions including cyber security.

QuickLaunch

QuickLaunch

QuickLaunch transforms how cloud-savvy institutions and companies manage human and device authentication, authorization, access control and integration.

HackHunter

HackHunter

HackHunter’s passive sensor network continuously monitors, detects and alerts when a malicious WiFi network and/or hacking behaviour is identified.

GoSecure

GoSecure

GoSecure Managed Detection and Response helps all organizations reduce dwell time by preventing breaches before they happen.

Cythereal

Cythereal

Cythereal is the leader in predicting and preventing advanced malware attacks. Security Automation for the Overwhelmed Administrator.

Viria

Viria

Viria is an information and security technology solution provider that promotes digitalization in a secure way.

Green Radar

Green Radar

Green Radar is a next generation cybersecurity company which combines technologies and services together to deliver Threat Detection for Emails and Deep Threat Analytics and Response.

Hackurity.io

Hackurity.io

Hackurity.io is a high energy IT security start-up founded in 2021 out of the frustration that IT Security is highly fragmented and reactive.

Mutare

Mutare

For three decades, Mutare has been empowering organizations to re-imagine a better way to connect through our transformative voice security, digital voice and text messaging solutions.

ID R&D

ID R&D

ID R&D is an award-winning provider of AI-based facial liveness, document liveness, and voice biometrics.

Judy Security

Judy Security

Judy (formerly AaDya Security) provides smart, simple, effective, all-in-one cybersecurity for SMBs. Get the 24/7 protection and support you deserve, at a price you can afford.

Cynclair

Cynclair

Cybersecurity is a complex beast. And we're the beast-tamers. Our team thrives on deciphering the latest threats, building cutting-edge defenses, and making your digital world much safer.

IT.ie

IT.ie

IT.ie are a comprehensive provider of Managed IT Services, Cloud Solutions, Cyber Security, and proactive IT support services.

Mesh Security

Mesh Security

Mesh Security transforms security data, tools, and infra for enterprise-wide visibility and control.